Preferred Language
Articles
/
ijl-53
Creating a Conductive Surface of the PMMA by Laser Cladding with DWCNT and MWCNTS
...Show More Authors

This work studied the electrical and thermal surface conductivity enhancement of polymethylmethacrylate (PMMA) clouded by double-walled carbon nanotubes (DWCNTs) and multi-walled carbon nanotube (MWCNTs) by using pulsed Nd:YAG laser. Variable input factors are considered as the laser energy (or the relevant power), pulse duration and pulse repetition rate. Results indicated that the DWCNTs increased the PMMA’s surface electrical conductivity from 10-15 S/m to 0.813×103 S/m while the MWCNTs raised it to 0.14×103 S/m. Hence, the DWCNTs achieved an increase of almost 6 times than that for the MWCNTs. Moreover, the former increased the thermal conductivity of the surface by 8 times and the later by 5 times.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The Rights of the Non-Muslims During the Rule of the Prophet Mohammed and Rashidians Succession Theoretically With Historical Witnesses
...Show More Authors

(Thimma) in Arabic means compact, and immunity. (People of Thimma) are the free non-Muslim people under Muslim rule. This includes Heavenly Religions people, i. e., Christian and Jews).
They have been called (People of Thimma) because they had paid (Jizyah: tribute) so they became safe for their souls, honor, properties at the custody of Muslims.
Islamic law had posed (Jizyah: tribute) upon the Jews and Christians who were living under Muslim rule as a reaction of not embracing Islam Faith against securing their rights and freedom.
Freedoms secured by Islam for the (People of Thimma) had been many, including the right of faith, not coercing them to be Muslim, the right to live, to possess properties, protect and secure them, the

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Contribution of Behavioral Disorders to Predicting Bullying Patterns in a Sample of Adolescents with Autism Spectrum Disorder: College of Education and Arts - Northern Border University - Kingdom of Saudi Arabia.
...Show More Authors

The present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entrepreneurial performance in accordance with the competitive intelligence and strategic
...Show More Authors

 The research aims to study the entrepreneurial performance of the banks, according to the intelligence of competitive and strategic as the entrepreneurial performance is the one who does not stand the benefits of excellence in accomplished when just achieving the bank's objectives planned, but exceed it down to creativity in accomplishing these goals in a manner leads to making a entrepreneurial bank in the markets and the focus the eyes of competitors and the banks and other Following his example.

Was chosen the subject of research and strategic intelligence and competitive because of its impact on the strategic success of the banking sector, the fact is the entrepreneurial in the Iraqi banking mar

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI: ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI
...Show More Authors

The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 18 2024
Journal Name
Molecular Crystals And Liquid Crystals
Synthesis and liquid crystal properties of a new class of calamitic mesogens based on twin 1,3,4-thiadiazole derivatives with imine linkage
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Drug Delivery Science And Technology
Antibacterial and wound healing performance of a novel electrospun nanofibers based on polymethyl-methacrylate/gelatin impregnated with different content of propolis
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Journal Of Petroleum Research & Studies
Preparation of Cross Linked PVA with MA, EDTA and a mixture of MA/EDTA for water uptake membranes at different pH
...Show More Authors

Poly (viny1 alcohol) (PVA) of 72000 g mol -1 molar mass was cross linked through cold cast esterification with different mol % of MA and EDTA (10 % , 20 % and 30 % ), and two different mol % mixture of MA l EDTA (20 %/5% and 20%/10% .

Publication Date
Sun Nov 01 2020
Journal Name
The International Journal Of Oral & Maxillofacial Implants
Early Failure Rate and Associated Risk Factors for Dental Implants Placed With and Without Maxillary Sinus Augmentation: A Retrospective Study
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref